CVE-2003-0364
CVSS5.0
发布时间 :2003-06-16 00:00:00
修订时间 :2008-09-10 15:18:46
NMCOS    

[原文]The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.


[CNNVD]Linux内核碎片重组远程拒绝服务攻击漏洞(CNNVD-200306-061)

        
        Linux是一款免费开放源代码的操作系统。
        Linux不正确处理部分类型的网络通信,远程攻击者可以利用这个漏洞使系统消耗过多资源,造成拒绝服务。
        问题存在与Linux内核处理TCP/IP碎片重组机制中,目前没有提供详细漏洞细节。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:7.3Red Hat Linux 7.3
cpe:/o:redhat:linux:9.0Red Hat Linux 9.0
cpe:/o:redhat:linux:8.0Red Hat Linux 8.0
cpe:/o:redhat:linux:7.1Red Hat Linux 7.1
cpe:/o:redhat:linux:7.2Red Hat Linux 7.2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:295Linux Kernel TCP/IP Fragment Reassembly Denial of Service
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0364
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0364
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200306-061
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2003-187.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:187
http://www.debian.org/security/2003/dsa-311
(VENDOR_ADVISORY)  DEBIAN  DSA-311
http://www.turbolinux.com/security/TLSA-2003-41.txt
(VENDOR_ADVISORY)  TURBO  TLSA-2003-41
http://www.redhat.com/support/errata/RHSA-2003-198.html
(UNKNOWN)  REDHAT  RHSA-2003:198
http://www.redhat.com/support/errata/RHSA-2003-195.html
(UNKNOWN)  REDHAT  RHSA-2003:195
http://www.debian.org/security/2004/dsa-442
(UNKNOWN)  DEBIAN  DSA-442
http://www.debian.org/security/2003/dsa-336
(UNKNOWN)  DEBIAN  DSA-336
http://www.debian.org/security/2003/dsa-332
(UNKNOWN)  DEBIAN  DSA-332
http://www.debian.org/security/2003/dsa-312
(UNKNOWN)  DEBIAN  DSA-312

- 漏洞信息

Linux内核碎片重组远程拒绝服务攻击漏洞
中危 设计错误
2003-06-16 00:00:00 2005-10-20 00:00:00
远程  
        
        Linux是一款免费开放源代码的操作系统。
        Linux不正确处理部分类型的网络通信,远程攻击者可以利用这个漏洞使系统消耗过多资源,造成拒绝服务。
        问题存在与Linux内核处理TCP/IP碎片重组机制中,目前没有提供详细漏洞细节。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:187-01)以及相应补丁:
        RHSA-2003:187-01:Updated 2.4 kernel fixes vulnerabilities and driver bugs
        链接:https://www.redhat.com/support/errata/RHSA-2003-187.html
        补丁下载:
        Red Hat Linux 7.1:
        SRPMS:
        ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.1/en/os/SRPMS/quota-3.06-9.71.src.rpm
        athlon:
        ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.1/en/os/i386/quota-3.06-9.71.i386.rpm
        i586:
        ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 7.2:
        SRPMS:
        ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.2/en/os/SRPMS/quota-3.06-9.7.src.rpm
        athlon:
        ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.2/en/os/i386/quota-3.06-9.7.i386.rpm
        i586:
        ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 7.3:
        SRPMS:
        ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-18.7.src.rpm
        ftp://updates.redhat.com/7.3/en/os/SRPMS/quota-3.06-9.7.src.rpm
        athlon:
        ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-18.7.athlon.rpm
        ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-18.7.athlon.rpm
        i386:
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-18.7.i386.rpm
        ftp://updates.redhat.com/7.3/en/os/i386/quota-3.06-9.7.i386.rpm
        i586:
        ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-18.7.i586.rpm
        ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-18.7.i586.rpm
        i686:
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-18.7.i686.rpm
        ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-18.7.i686.rpm
        Red Hat Linux 8.0:
        SRPMS:
        ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.20-18.8.src.rpm
        athlon:
        ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.20-18.8.athlon.rpm
        

- 漏洞信息

4566
Linux Kernel TCP/IP Fragment Reassembly DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-05-28 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Kernel Fragment Reassembly Remote Denial Of Service Vulnerability
Design Error 7797
Yes No
2003-06-03 12:00:00 2009-07-11 10:06:00
Vulnerability announced by Red Hat.

- 受影响的程序版本

RedHat kernel-utils-2.4-8.29.i386.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-utils-2.4-8.13.i386.rpm
+ RedHat Linux 8.0
RedHat kernel-utils-2.4-7.4.i386.rpm
+ RedHat Linux 7.3
RedHat kernel-uml-2.4.18-14.i686.rpm
+ RedHat Linux 8.0
RedHat kernel-source-2.4.7-10.i386.rpm
+ RedHat Linux 7.2
RedHat kernel-source-2.4.20-8.i386.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-source-2.4.2-2.i386.rpm
+ RedHat Linux 7.1
RedHat kernel-source-2.4.18-3.i386.rpm
+ RedHat Linux 7.3
RedHat kernel-source-2.4.18-14.i386.rpm
+ RedHat Linux 8.0
RedHat kernel-smp-2.4.7-10.i686.rpm
+ RedHat Linux 7.2
RedHat kernel-smp-2.4.7-10.i586.rpm
+ RedHat Linux 7.2
RedHat kernel-smp-2.4.7-10.athlon.rpm
+ RedHat Linux 7.2
RedHat kernel-smp-2.4.20-8.i686.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-smp-2.4.20-8.athlon.rpm
RedHat kernel-smp-2.4.2-2.i686.rpm
+ RedHat Linux 7.1
RedHat kernel-smp-2.4.2-2.i586.rpm
RedHat kernel-smp-2.4.18-3.i686.rpm
+ RedHat Linux 7.3
RedHat kernel-smp-2.4.18-3.i586.rpm
+ RedHat Linux 7.3
RedHat kernel-smp-2.4.18-3.athlon.rpm
+ RedHat Linux 7.3
RedHat kernel-smp-2.4.18-14.i686.rpm
RedHat kernel-smp-2.4.18-14.athlon.rpm
+ RedHat Linux 8.0
RedHat kernel-headers-2.4.7-10.i386.rpm
+ RedHat Linux 7.2
RedHat kernel-headers-2.4.2-2.i386.rpm
+ RedHat Linux 7.1
RedHat kernel-enterprise-2.4.2-2.i686.rpm
+ RedHat Linux 7.1
RedHat kernel-doc-2.4.7-10.i386.rpm
RedHat kernel-doc-2.4.20-8.i386.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-doc-2.4.2-2.i386.rpm
+ RedHat Linux 7.1
RedHat kernel-doc-2.4.18-3.i386.rpm
+ RedHat Linux 7.3
RedHat kernel-doc-2.4.18-14.i386.rpm
+ RedHat Linux 8.0
RedHat kernel-debug-2.4.18-3.i686.rpm
RedHat kernel-debug-2.4.18-14.i686.rpm
+ RedHat Linux 8.0
RedHat kernel-BOOT-2.4.7-10.i386.rpm
+ RedHat Linux 7.2
RedHat kernel-BOOT-2.4.20-8.i386.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-BOOT-2.4.2-2.i386.rpm
+ RedHat Linux 7.1
RedHat kernel-BOOT-2.4.18-3.i386.rpm
+ RedHat Linux 7.3
RedHat kernel-BOOT-2.4.18-14.i386.rpm
RedHat kernel-bigmem-2.4.20-8.i686.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-bigmem-2.4.18-3.i686.rpm
+ RedHat Linux 7.3
RedHat kernel-bigmem-2.4.18-14.i686.rpm
+ RedHat Linux 8.0
RedHat kernel-2.4.7-10.i686.rpm
+ RedHat Linux 7.2
RedHat kernel-2.4.7-10.i386.rpm
+ RedHat Linux 7.2
RedHat kernel-2.4.7-10.athlon.rpm
+ RedHat Linux 7.2
RedHat kernel-2.4.20-8.i686.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-2.4.20-8.i586.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-2.4.20-8.athlon.rpm
+ RedHat Linux 9.0 i386
RedHat kernel-2.4.2-2.i686.rpm
RedHat kernel-2.4.2-2.i586.rpm
RedHat kernel-2.4.2-2.i386.rpm
+ RedHat Linux 7.1
RedHat kernel-2.4.18-3.i686.rpm
+ RedHat Linux 7.3
RedHat kernel-2.4.18-3.i386.rpm
+ RedHat Linux 7.3
RedHat kernel-2.4.18-3.athlon.rpm
+ RedHat Linux 7.3
RedHat kernel-2.4.18-14.i686.rpm
+ RedHat Linux 8.0
RedHat kernel-2.4.18-14.i586.rpm
+ RedHat Linux 8.0
RedHat kernel-2.4.18-14.athlon.rpm
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 2.1
Red Hat Enterprise Linux AS 2.1
Linux kernel 2.4.20
Linux kernel 2.4.19 -pre6
Linux kernel 2.4.19 -pre5
Linux kernel 2.4.19 -pre4
Linux kernel 2.4.19 -pre3
Linux kernel 2.4.19 -pre2
Linux kernel 2.4.19 -pre1
Linux kernel 2.4.19
+ Conectiva Linux 8.0
+ Conectiva Linux Enterprise Edition 1.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux 8.1
+ Slackware Linux -current
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
Linux kernel 2.4.18 pre-8
Linux kernel 2.4.18 pre-7
Linux kernel 2.4.18 pre-6
Linux kernel 2.4.18 pre-5
Linux kernel 2.4.18 pre-4
Linux kernel 2.4.18 pre-3
Linux kernel 2.4.18 pre-2
Linux kernel 2.4.18 pre-1
Linux kernel 2.4.18 x86
+ Debian Linux 3.0 ia-32
Linux kernel 2.4.18
+ Astaro Security Linux 2.0 23
+ Astaro Security Linux 2.0 16
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
+ RedHat Advanced Workstation for the Itanium Processor 2.1
+ RedHat Linux 8.0
+ RedHat Linux 7.3
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux 8.0
+ S.u.S.E. Linux 7.3
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
+ S.u.S.E. Linux Connectivity Server
+ S.u.S.E. Linux Database Server 0
+ S.u.S.E. Linux Firewall on CD
+ S.u.S.E. Linux Office Server
+ S.u.S.E. Linux Openexchange Server
+ S.u.S.E. Linux Personal 8.2
+ S.u.S.E. SuSE eMail Server 3.1
+ S.u.S.E. SuSE eMail Server III
+ SuSE SUSE Linux Enterprise Server 8
+ SuSE SUSE Linux Enterprise Server 7
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Linux kernel 2.4.17
Linux kernel 2.4.16
+ Sun Cobalt RaQ 550
Linux kernel 2.4.15
Linux kernel 2.4.14
Linux kernel 2.4.13
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
Linux kernel 2.4.12
+ Conectiva Linux 7.0
Linux kernel 2.4.11
Linux kernel 2.4.10
Linux kernel 2.4.9
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux 7.2 ia64
+ RedHat Linux 7.2 i386
+ RedHat Linux 7.2 alpha
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ Sun Linux 5.0.5
+ Sun Linux 5.0.3
+ Sun Linux 5.0
Linux kernel 2.4.8
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.7
+ RedHat Linux 7.2
+ S.u.S.E. Linux 7.2
+ S.u.S.E. Linux 7.1
Linux kernel 2.4.6
Linux kernel 2.4.5
+ Slackware Linux 8.0
Linux kernel 2.4.4
+ S.u.S.E. Linux 7.2
Linux kernel 2.4.3
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
Linux kernel 2.4.2
Linux kernel 2.4.1
Linux kernel 2.4 .0-test9
Linux kernel 2.4 .0-test8
Linux kernel 2.4 .0-test7
Linux kernel 2.4 .0-test6
Linux kernel 2.4 .0-test5
Linux kernel 2.4 .0-test4
Linux kernel 2.4 .0-test3
Linux kernel 2.4 .0-test2
Linux kernel 2.4 .0-test12
Linux kernel 2.4 .0-test11
Linux kernel 2.4 .0-test10
Linux kernel 2.4 .0-test1
Linux kernel 2.4

- 漏洞讨论

It has been reported that the Linux kernel does not properly handle some specific types of network traffic. Because of this, an attacker may be able to cause excessive consumption of resources with malicious TCP/IP packets, resulting in a denial of service.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Red Hat has released advisory RHSA-2003:187-01 and fixes to address this issue. See referenced advisory for fix details.

Debian has issued a kernel upgrade that is patched. Please see the advisories linked to in the reference section (DSA-311-1 and DSA 312-1) for URLs to fixes.

Red Hat Linux has released a new advisory RHSA-2003:195-06. Fixes are available through the Red Hat Network. Affected users are advised to upgrade.

Debian has released a new advisory DSA 332-1. Information about obtaining and applying fixes can be found in the referenced advisory.

Debian has announced in DSA 336-2 that advisory DSA 336-1 does not address this issue.

Conectiva has released advisory CLA-2003:701 to address this issue. See referenced advisory for additional details and fix information.

Red Hat has released an advisory (RHSA-2003:198-16) containing updated IA64 fixes for Red Hat Enterprise Linux AS (v. 2.1) and Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor. These fixes are only available through the Red Hat Network which can be found at http://rhn.redhat.com/.

Conectiva has released a security advisory (CLSA-2003:730) containing fixes to address this issue in CLEE 1.0. Users are advised to upgrade as soon as possible.

RHBA-2003:263-05 (for non-Enterprise Red Hat distributions) has been released to address unrelated bugs but provides Kernel updates that include more recent fixes for this and other security vulnerabilities.

Conectiva has released a security advisory (CLA-2003:796) containing fixes to address this issue in Conectiva Linux 8.

Debian has released DSA 442-1 to provide fixes for s390 platforms. Please see the attached advisory for further information.


RedHat kernel-2.4.18-3.i686.rpm

RedHat kernel-2.4.2-2.i386.rpm

RedHat kernel-source-2.4.18-14.i386.rpm

RedHat kernel-bigmem-2.4.18-14.i686.rpm

RedHat kernel-BOOT-2.4.7-10.i386.rpm

RedHat kernel-doc-2.4.2-2.i386.rpm

RedHat kernel-2.4.20-8.athlon.rpm

RedHat kernel-source-2.4.2-2.i386.rpm

RedHat kernel-2.4.7-10.athlon.rpm

RedHat kernel-doc-2.4.18-3.i386.rpm

RedHat kernel-BOOT-2.4.20-8.i386.rpm

RedHat kernel-2.4.20-8.i586.rpm

RedHat kernel-2.4.7-10.i686.rpm

RedHat kernel-bigmem-2.4.20-8.i686.rpm

RedHat kernel-source-2.4.20-8.i386.rpm

RedHat kernel-2.4.20-8.i686.rpm

RedHat kernel-BOOT-2.4.18-3.i386.rpm

RedHat kernel-doc-2.4.18-14.i386.rpm

RedHat kernel-BOOT-2.4.2-2.i386.rpm

RedHat kernel-2.4.7-10.i386.rpm

RedHat kernel-2.4.18-3.athlon.rpm

RedHat kernel-2.4.18-3.i386.rpm

RedHat kernel-bigmem-2.4.18-3.i686.rpm

RedHat kernel-source-2.4.7-10.i386.rpm

RedHat kernel-2.4.18-14.i586.rpm

RedHat kernel-2.4.18-14.i686.rpm

RedHat kernel-doc-2.4.20-8.i386.rpm

Linux kernel 2.4.17

Linux kernel 2.4.18 x86

Linux kernel 2.4.19

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站